Open Source or Closed Source? A Competitive Analysis with Software Security
Author
Abstract
Suggested Citation
DOI: 10.1287/deca.2019.0390
Download full text from publisher
References listed on IDEAS
- Nicholas Economides & Evangelos Katsamakas, 2006.
"Two-Sided Competition of Proprietary vs. Open Source Technology Platforms and the Implications for the Software Industry,"
Management Science, INFORMS, vol. 52(7), pages 1057-1071, July.
- Nicholas Economides & Evangelos Katsamakas, 2004. "Two-sided competition of proprietary vs. open source technology platforms and the implications for the software industry," Working Papers 04-30, New York University, Leonard N. Stern School of Business, Department of Economics.
- Nicholas Economides & Evangelos Katsamakas, 2004. "Two-sided competition of proprietary vs. open source technology platforms and the implications for the software industry," Working Papers 04-22, NET Institute, revised Aug 2004.
- Nicholas Economides & Evangelos Katsamakas, 2005. "Two-sided competition of proprietary vs. open source technology platforms and the implications for the software industry," Working Papers 05-06, NET Institute.
- Nicholas Economides & Evangelos Katsamakas, 2005. "Two-sided competition of proprietary vs. open source technology platforms, and the implications for the software industry," Working Papers 05-02, NET Institute, revised Oct 2005.
- Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
- Kevin Xiaoguo Zhu & Zach Zhizhong Zhou, 2012. "Research Note ---Lock-In Strategy in Software Competition: Open-Source Software vs. Proprietary Software," Information Systems Research, INFORMS, vol. 23(2), pages 536-545, June.
- Terrence August & Tunay I. Tunca, 2006. "Network Software Security and User Incentives," Management Science, INFORMS, vol. 52(11), pages 1703-1720, November.
- Ramon Casadesus‐Masanell & Gastón Llanes, 2015. "Investment Incentives in Open‐Source and Proprietary Two‐Sided Platforms," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 24(2), pages 306-324, June.
- Caulkins, Jonathan P. & Feichtinger, Gustav & Grass, Dieter & Hartl, Richard F. & Kort, Peter M. & Seidl, Andrea, 2013. "When to make proprietary software open source," Journal of Economic Dynamics and Control, Elsevier, vol. 37(6), pages 1182-1194.
- Ramon Casadesus-Masanell & Pankaj Ghemawat, 2006. "Dynamic Mixed Duopoly: A Model Motivated by Linux vs. Windows," Management Science, INFORMS, vol. 52(7), pages 1072-1084, July.
- Terrence August & Tunay I. Tunca, 2011. "Who Should Be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments," Management Science, INFORMS, vol. 57(5), pages 934-959, May.
- Alfredo Garcia & Yue Sun & Joseph Shen, 2014. "Dynamic Platform Competition with Malicious Users," Dynamic Games and Applications, Springer, vol. 4(3), pages 290-308, September.
- Esther Gal-Or & Anindya Ghose, 2005.
"The Economic Incentives for Sharing Security Information,"
Information Systems Research, INFORMS, vol. 16(2), pages 186-208, June.
- Esther Gal-Or & Anindya Ghose, 2005. "The Economic Incentives for Sharing Security Information," Industrial Organization 0503004, University Library of Munich, Germany.
- Hausken, Kjell, 2006. "Income, interdependence, and substitution effects affecting incentives for security investment," Journal of Accounting and Public Policy, Elsevier, vol. 25(6), pages 629-665.
- Vineet Kumar & Brett R. Gordon & Kannan Srinivasan, 2011. "Competitive Strategy for Open Source Software," Marketing Science, INFORMS, vol. 30(6), pages 1066-1078, November.
- Vijay Mookerjee & Radha Mookerjee & Alain Bensoussan & Wei T. Yue, 2011. "When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination," Information Systems Research, INFORMS, vol. 22(3), pages 606-623, September.
- Xing Gao & Weijun Zhong, 2015. "Information security investment for competitive firms with hacker behavior and security requirements," Annals of Operations Research, Springer, vol. 235(1), pages 277-300, December.
- Terrence August & Hyoduk Shin & Tunay I. Tunca, 2013. "Licensing and Competition for Services in Open Source Software," Information Systems Research, INFORMS, vol. 24(4), pages 1068-1086, December.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Zha, Yong & Wu, Xiangxiang & Liu, Haonan & Yu, Yugang, 2023. "Impact of a Platform Developer's Entry on the Device Manufacturer with Different Power Structures and Revenue Models," Omega, Elsevier, vol. 115(C).
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Xing Gao & Weijun Zhong, 2016. "A differential game approach to security investment and information sharing in a competitive environment," IISE Transactions, Taylor & Francis Journals, vol. 48(6), pages 511-526, June.
- Yong Wu & Junlin Duan & Tao Dai & Dong Cheng, 2020. "Managing Security Outsourcing in the Presence of Strategic Hackers," Decision Analysis, INFORMS, vol. 17(3), pages 235-259, September.
- Terrence August & Hyoduk Shin & Tunay I. Tunca, 2013. "Licensing and Competition for Services in Open Source Software," Information Systems Research, INFORMS, vol. 24(4), pages 1068-1086, December.
- Eric Darmon & Dominique Torre, 2010.
"Open source, dual licensing and software compétition,"
Post-Print
halshs-00497623, HAL.
- Éric Darmon & Dominique Torre, 2014. "Open Source, Dual Licensing and Software Competition," Economics Working Paper Archive (University of Rennes & University of Caen) 201405, Center for Research in Economics and Management (CREM), University of Rennes, University of Caen and CNRS.
- Eric Darmon & Dominique Torre, 2010. "Open source, dual licensing and software competition," Post-Print halshs-00554776, HAL.
- Luigi Balletta & Antonio Tesoriere, 2020. "Cumulative innovation, open source, and distance to frontier," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 22(6), pages 1875-1920, December.
- Terrence August & Hyoduk Shin & Tunay I. Tunca, 2018. "Generating Value Through Open Source: Software Service Market Regulation and Licensing Policy," Information Systems Research, INFORMS, vol. 29(1), pages 186-205, March.
- Sheen S. Levine & Michael J. Prietula, 2014. "Open Collaboration for Innovation: Principles and Performance," Organization Science, INFORMS, vol. 25(5), pages 1414-1433, October.
- Zach Zhizhong Zhou & Vidyanand Choudhary, 2022. "Impact of Competition from Open Source Software on Proprietary Software," Production and Operations Management, Production and Operations Management Society, vol. 31(2), pages 731-742, February.
- Yong Wu & Mengyao Xu & Dong Cheng & Tao Dai, 2022. "Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker," Decision Analysis, INFORMS, vol. 19(2), pages 99-122, June.
- Zha, Yong & Wu, Xiangxiang & Liu, Haonan & Yu, Yugang, 2023. "Impact of a Platform Developer's Entry on the Device Manufacturer with Different Power Structures and Revenue Models," Omega, Elsevier, vol. 115(C).
- Xing Gao & Siyu Gong, 2022. "An economic analysis of information security outsourcing with competitive firms," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 43(7), pages 2748-2758, October.
- Xing Gao & Weijun Zhong, 2016. "Economic incentives in security information sharing: the effects of market structures," Information Technology and Management, Springer, vol. 17(4), pages 361-377, December.
- Ron Adner & Jianqing Chen & Feng Zhu, 2020. "Frenemies in Platform Markets: Heterogeneous Profit Foci as Drivers of Compatibility Decisions," Management Science, INFORMS, vol. 66(6), pages 2432-2451, June.
- Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
- Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
- Terrence August & Wei Chen & Kevin Zhu, 2021. "Competition Among Proprietary and Open-Source Software Firms: The Role of Licensing in Strategic Contribution," Management Science, INFORMS, vol. 67(5), pages 3041-3066, May.
- Chung‐Hui Chou, 2021. "Could coexistence of open‐source and proprietary platforms be an equilibrium outcome?," Manchester School, University of Manchester, vol. 89(3), pages 297-309, June.
- Engelhardt, Sebastian v. & Freytag, Andreas, 2013.
"Institutions, culture, and open source,"
Journal of Economic Behavior & Organization, Elsevier, vol. 95(C), pages 90-110.
- Andreas Freytag & Sebastian von Engelhardt, 2010. "Institutions, Culture, and Open Source," Jena Economics Research Papers 2010-010, Friedrich-Schiller-University Jena.
- Bitzer, Jürgen & Geishecker, Ingo, 2010. "Who contributes voluntarily to OSS? An investigation among German IT employees," Research Policy, Elsevier, vol. 39(1), pages 165-172, February.
- Luigi Di Gaetano, 2015.
"A Model of corporate donations to open source under hardware–software complementarity,"
Industrial and Corporate Change, Oxford University Press and the Associazione ICC, vol. 24(1), pages 163-190.
- Di Gaetano, Luigi, 2012. "A Model of corporate donations to open source under hardware–software complementarity," MPRA Paper 39849, University Library of Munich, Germany.
More about this item
Keywords
business models; security concern; competition;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:ordeca:v:17:y:2020:i:1:p:56-73. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.